(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

(Image Omitted: This report summarizes recent US and European work on conventions for
handling two basic types of remote operations: terminal access to remote hosts and file transfer
between hosts.)

There are two major classes of protocols in a general- purpose computer network:
communications protocols and resource sharing protocols. Communications protocols, often
referred to as lower-level protocols, are primarily concerned with the reliable transfer of data,
while resource sharing protocols, often referred to as higher- level protocols, are primarily
concerned with performing remote operations. This article discusses two basic classes of
resource sharing protocols: terminal and file transfer job protocols.

Terminal protocols establish mechanisms that allow efficient, flexible terminal access to remote
hosts. Terminal protocols can also be used as a characteroriented network interprocess
communication facility. File transfer protocols allow users to manipulate remote file systems and
to transfer files or parts of files from one host system to another. Many of the problems
encountered in these protocols recur in more complex forms in the more sophisticated protocols
(e.g., network mail protocols, distributed data base protocols) which may be built on top of them.

Since homogeneous network protocols are generally a subset of heterogeneous network
protocols in both scope and mechanisms, we will restrict our discussion to heterogenous
network protocols.

Terminal protocols

Terminal access.

Probably the most common computer communications requirement today is for terminal access,
which is commonly provided by terminal-concentrator networks organized into a star or tree
topology. Terminals and terminal concentrators are connected by point-to-point lines to the
central data processing center. The point-to-point lines, and in some cases the terminal
concentrators, of a terminal- concentrator network can be replaced with a packet-switched
network. Replacing a terminalconcentrator network by a packet-switched network can
significantly reduce costs and increase reliability.

Terminal access to a network may be provided in one of three basic ways: through a large
computer or "host," through a network access machine or "minihost," or through a direct
interface. When a large computer is connected to a network, terminals may access the network
using special software residing in the host. In the second approach, a dedicated minicomputer
provides many of the...